ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • Application Shielding First Line of Defense for Financial Apps

    Sponsored by: Intertrust

    In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.

  • Architecting End User Computing Solutions

    Sponsored by: Nutanix

    What are the possible infrastructures at your disposal that will streamline and simplify EUC project completion? Download this e-book to view several options for VDI and EUC environments, and to learn how to implement them in your organization, such as converged infrastructure, hyper-converged infrastructure, and more.

  • Are you securing the right things? How to effectively secure your data

    Sponsored by: ComputerWeekly.com

    The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches.

  • Avenue Stores Blocks ATO and Scraping with PerimeterX Bot Defender

    Sponsored by: PerimeterX

    In this case study, discover how Avenue Stores, a leader in plus size fashion, collaborated with PerimeterX to address malicious bot activity they were experiencing including ATO, web scraping, and card fraud.

  • Avoid Authentication Anarchy: How to Choose your Authenticator

    Sponsored by: HID Global

    Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Beginner's Guide to Open Source Intrusion Detection Tools

    Sponsored by: AT&T Cybersecurity

    Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.

  • Beginners Guide to Open Source Intrusion Detection Tools

    Sponsored by: AT&T Cybersecurity

    Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.

  • APT Defense Mechanisms and Best Practices

    Sponsored by: Infoblox

    Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

  • Architecting the Composable Enterprise

    Sponsored by: MuleSoft

    This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.

  • As data grows, so do the risks: How to improve data and app sec

    Sponsored by: IBM

    Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.

  • Assessing Hyper-converged Infrastructures Based on Feature Capabilities

    Sponsored by: Pure Storage

    In this expert guide, 20-year industry veteran Jacob Gsoedl demonstrates how hyper-converged systems differ from traditional storage systems. Read on to get a run-down of the top considerations buyers should have on their checklist for evaluating, purchasing, and deploying HCI, and more.

  • Assessing Hyper-converged: Products, Scalability, and Ecosystem Support

    Sponsored by: Lenovo and Intel

    From the experts at SearchConvergedInfrastructure.com, this guide assesses several types of HCI architectures based on featured capabilities—including cost model, data protection, and resiliency. Read on to see the analysis, as well as to answer the burning question, "Why is the HCI definition so varied?"

  • Assessing the Value of Cloud Security Threat Intelligence Services

    Sponsored by: Hewlett Packard Enterprise

    This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.

  • AT&T Business Continuity Survey: 2008

    Sponsored by: AT&T Corp

    The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.

  • Automated Penetration Testing; Can IT Afford Not To?

    Sponsored by: Core Security Technologies

    This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.

  • Automating the IT Service Desk

    Sponsored by: ServiceNow

    Since its inception, the IT service desk has provided an intuitive portal designed to make it easier for users to get technical help – and for IT associates to keep on top of support workflows. So what happens when automation is thrown into the mix? Dive into this E-Guide to take a closer look.

  • Avoid HIPAA Compliance Violations Amid the Rise of BYOD

    Sponsored by: Imprivata

    This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.

  • Avoiding Compliance and Shadow IT Risks in the Cloud

    Sponsored by: CloudPassage

    This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.

  • Balancing Risk with Agility: Best Practices for Securing Cloud Deployments

    Sponsored by: Trend Micro

    Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett Packard Enterprise

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • Banca Intesa Counters Threats with HP ArcSight

    Sponsored by: Hewlett Packard Enterprise

    Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.

  • Becoming a Social Business: The IBM Story

    Sponsored by: IBM

    In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.

  • Behavioral Analytics Applied to Security

    Sponsored by: FileTrek

    This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.